Football and Firewalls: A Winning Game Plan to Improve Network Security

Your network security playbook should include an intrusion prevention system (IPS) to detect and respond to threats your firewall misses.

The post Football and Firewalls: A Winning Game Plan to Improve Network Security appeared first on Security Intelligence.

Continue reading Football and Firewalls: A Winning Game Plan to Improve Network Security

Using Layered Security to Keep Warm for the Winter

Security teams must implement layered security capabilities to defend against the variety of threats fraudsters launch to capitalize on the holiday bustle.

The post Using Layered Security to Keep Warm for the Winter appeared first on Security Intelligence.

Continue reading Using Layered Security to Keep Warm for the Winter

The Internet of Trouble: Securing Vulnerable IoT Devices

In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.

The post The Internet of Trouble: Securing Vulnerable IoT Devices appeared first on Security Intelligence.

Continue reading The Internet of Trouble: Securing Vulnerable IoT Devices

Changing of the Guard: Three Considerations for Your Next IPS Purchase

Recent changes in the security market have influenced many IT professionals to focus on the long-term success of their programs when shopping for an IPS.

The post Changing of the Guard: Three Considerations for Your Next IPS Purchase appeared first on Security Intelligence.

Continue reading Changing of the Guard: Three Considerations for Your Next IPS Purchase

Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security

When you huddle around the coffee machine at work or flip on your smart kettle at home, do you consider the security of the Internet of Things (IoT) devices you are using? If you’re like most, IoT security is probably the last thing on your mind. Today it is more and more likely that these […]

The post Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security appeared first on Security Intelligence.

Continue reading Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security

In Prevention We Trust? When and How to Use Endpoint Detection and Response

Over the last few years, there has been a lot of talk about next-generation endpoint security and prevention tools versus endpoint detection and response solutions. Many clients ask the same questions about bolstering their security posture and balance budgets, including where to start, what to augment, what to replace and, most importantly, where to invest. […]

The post In Prevention We Trust? When and How to Use Endpoint Detection and Response appeared first on Security Intelligence.

Continue reading In Prevention We Trust? When and How to Use Endpoint Detection and Response

It’s the Simple Things: Getting the Basics Right Can Solve Complex Security Issues

Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.

The post It’s the Simple Things: Getting the Basics Right Can Solve Complex Security Issues appeared first on Security Intelligence.

Continue reading It’s the Simple Things: Getting the Basics Right Can Solve Complex Security Issues

Using Feedback Loops to Enhance End User Security

Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.

The post Using Feedback Loops to Enhance End User Security appeared first on Security Intelligence.

Continue reading Using Feedback Loops to Enhance End User Security

Windows 10 Updates: What Does It Mean for Customers?

Microsoft shifted its approach to updating its Windows OS platform with Windows 10. Here’s what you have to know about the options for enterprises.

The post Windows 10 Updates: What Does It Mean for Customers? appeared first on Security Intelligence.

Continue reading Windows 10 Updates: What Does It Mean for Customers?

Adapting Your Defenses to the Attack: The Next Generation of Endpoint Protection

The endpoint protection of the future must be able to identify indicators of compromise, locate vulnerabilities and move to patch them quickly.

The post Adapting Your Defenses to the Attack: The Next Generation of Endpoint Protection appeared first on Security Intelligence.

Continue reading Adapting Your Defenses to the Attack: The Next Generation of Endpoint Protection